cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
☆1,243Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.☆553Updated this week
- 📚 A curated list of awesome Docker security resources☆681Updated last month
- ☆570Updated 2 years ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,105Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,129Updated 8 months ago
- My cheatsheet notes to pentest AWS infrastructure☆681Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,141Updated 4 months ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆893Updated 2 years ago
- A curated list of awesome CI CD security resources☆549Updated 8 months ago
- Checklist for container security - devsecops practices☆1,580Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,081Updated 2 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,731Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,885Updated last month
- all paths lead to clouds☆638Updated last year
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,031Updated last month
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆814Updated 3 months ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,569Updated 3 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,249Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,453Updated 2 years ago
- Dangerously fast DNS/network/port scanner☆909Updated 3 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,393Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆996Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆981Updated 3 weeks ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆1,992Updated 6 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,059Updated 2 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,208Updated 8 months ago
- Vulnerable app with examples showing how to not use secrets☆1,334Updated this week
- NMAP Vulnerability Scanning Scripts☆629Updated 3 years ago
- List of regex for scraping secret API keys and juicy information.☆709Updated 2 years ago